Search Results - (( java implementation mining algorithm ) OR ( pattern detection force algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- pattern detection »
- mining algorithm »
- detection force »
- force algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
Get full text
Get full text
Thesis -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
12
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…This feature makes it suitable to detect the pattern of head movement and hence a call bell for patients with special needs.…”
Get full text
Get full text
Get full text
Thesis -
14
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
15
Spectral Estimation And Supervised Classification Technique For Real Time Electromyography Pattern Recognition
Published 2018“…Electromyography (EMG) signal is a biomedical signal which measures physical activity of human muscle.It has been acknowledged to be widely used in rehabilitation or recovery application system assisting physiotherapist to monitor a patient’s physical strength,function,motion and overall well-being by addressing the underlying physical issues.In application system associated with rehabilitation,a signal processing and classification techniques are implemented to classify EMG signal obtained.For real time application in the rehabilitation, the classification is crucial issue.The success of the signal classification depends on the selection of the features that represent a raw EMG signal in the signal processing.Therefore,a robust and resilient denoising method and spectral estimation technique have been acknowledged as necessary to distinguish and detect the EMG pattern.The present study was undertaken to determine the characteristic of EMG features using denoising method and spectral estimation technique for assessing the EMG pattern based on a supervised classification algorithm.In the study,the combination of time-frequency domain (TFD) and time domain (TD) were identified as the preferred denoising method and spectral estimation techniques.In the first part of study, the recorded EMG signal filtered the contaminated noise by using wavelet transform (WT) approach which implemented discrete wavelet transform (DWT) method of the wavelet-denoising signal. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Enhanced faster region-based convolutional neural network for oil palm tree detection
Published 2021“…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
Get full text
Get full text
Thesis
